Your SlideShare is downloading. ×
Congestion Control
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Congestion Control

3,564

Published on

Unit 4 Of ACN

Unit 4 Of ACN

Published in: Technology, Business
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
3,564
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
123
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CONGESTION CONTROL
  • 2. Congestion Control
    • When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results.
    • Because routers are receiving packets faster than they can forward them, one of two things must happen:
      • The subnet must prevent additional packets from entering the congested region until those already present can be processed.
      • The congested routers can discard queued packets to make room for those that are arriving.
  • 3. Factors that Cause Congestion
    • Packet arrival rate exceeds the outgoing link capacity.
    • Insufficient memory to store arriving packets
    • Bursty traffic
    • Slow processor
  • 4. Congestion Control vs Flow Control
    • Congestion control is a global issue – involves every router and host within the subnet
    • Flow control – scope is point-to-point; involves just sender and receiver.
  • 5. Congestion Control, cont.
    • Congestion Control is concerned with efficiently using a network at high load.
    • Techniques for detection and recovery are:
      • Warning bit
      • Choke packets
      • Load shedding
  • 6. Warning Bit
    • A special bit in the packet header is set by the router to warn the source when congestion is detected.
    • The bit is copied and piggy-backed on the ACK and sent to the sender.
    • The sender monitors the number of ACK packets it receives with the warning bit set and adjusts its transmission rate accordingly.
  • 7. Choke Packets
    • A more direct way of telling the source to slow down.
    • A choke packet is a control packet generated at a congested node and transmitted to restrict traffic flow.
    • The source, on receiving the choke packet must reduce its transmission rate by a certain percentage.
    • An example of a choke packet is the ICMP Source Quench Packet.
  • 8. Hop-by-Hop Choke Packets
    • Over long distances or at high speeds choke packets are not very effective.
    • A more efficient method is to send to choke packets hop-by-hop.
    • This requires each hop to reduce its transmission even before the choke packet arrive at the source.
  • 9. Load Shedding
    • When buffers become full, routers simply discard packets.
    • Which packet is chosen to be the victim depends on the application and on the error strategy used in the data link layer.
    • For a file transfer, for, e.g. cannot discard older packets since this will cause a gap in the received data.
    • For real-time voice or video it is probably better to
    • throw away old data and keep new packets.
    • Get the application to mark packets with discard priority.

×